Fri.Nov 08, 2019

Bill Would Create a Federal Digital Privacy Agency

Data Breach Today

Legislation Spells Out Privacy Rights and Enforcement Measures Two Democratic members of the U.S. House have proposed a national privacy law that calls for the formation of a new federal agency to enforce the privacy rights that it defines

Italian police shut down darkweb Berlusconi market and arrested admins

Security Affairs

Italian law enforcement shut down the ‘Berlusconi market’ black market and arrested three suspected of being its administrators.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Health Data Breach Tally Update: Top Causes

Data Breach Today

An Analysis of the Latest Trends - and What's Ahead Hacker attacks, IT mishaps, and vendor errors are among the top causes of the largest health data breaches added to the official federal tally so far this year. Here's an update

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Security Affairs

Microsoft is warning once again of more BlueKeep attacks that could deliver disruptive payloads and urges organizations to patch their systems.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Following Massive Breach, Capital One Replacing CISO: Report

Data Breach Today

Bank Reportedly Will Look Outside the Company for Security Leadership Nearly four months after Capital One revealed a massive data breach, Michael Johnson, the bank's CISO, is being moved into an outside advisory role, and the company is scouting for a new security leader, according to the Wall Street Journal.

More Trending

Update: PCI SSC's Enhanced Contactless Payment Standard

Data Breach Today

In December, PCI SSC plans to publish a new standard for solutions that enable "tap and go" transactions on merchant smartphones and other commercial off-the shelf mobile devices.

Hospital Cyberattacks Linked to Increase in Heart Attack Mortality

Dark Reading

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds

81

Sen. Wyden Pushes FCC on 5G Security

Data Breach Today

Lawmaker Asks for Encryption and Authentication Requirements U.S. Senator Ron Wyden is pushing the Federal Communications Commission to ensure that wireless carriers build new security measures, such as encryption and authentication, into 5G networks as they're rolled out over the next several year

6 Small-Business Password Managers

Dark Reading

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S.

#COBOL60: Your COBOL questions, answered – Part Two

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel.

IT 79

Protecting Data in Sprawling Computing Environments

Data Breach Today

Sprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA

Cloud 141

WhatsApp Cofounder Brian Acton on Why Privacy Matters

WIRED Threat Level

The cofounder of the messaging service and the current chair of the Signal Foundation talks about the proliferation of end-to-end encryption in personal communications. Business Business / Computers and Software Security

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Analysis: Using Twitter for Espionage

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks

9 Principles to Simplify Security

Dark Reading

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that

How AI can supercharge the benefits of business intelligence

Information Management Resources

AI is perfectly aligned to the goal of business intelligence, which is to make business more intelligent by augmenting and, in some cases, automating human intelligence. Artificial intelligence Business intelligence Data management

How Do We Bring Equality to Data Ownership and Usage?

WIRED Threat Level

Computational biologist Laura Boykin says scientists are “asleep at the wheel”; activist Malkia Devich-Cyril says citizens also need to pressure technology companies to change. Security Security / Security News

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

xHelper Malware for Android

Schneier on Security

xHelper is not interesting because of its infection mechanism; the user has to side-load an app onto his phone. It's not interesting because of its payload; it seems to do nothing more than show unwanted ads.

What Keeps NSA Cybersecurity Boss Anne Neuberger Up at Night

WIRED Threat Level

At WIRED25, the NSA's Anne Neuberger talked election security, low orbit satellites, and weaponized autonomous drones. Security Security / National Security

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkits

Security Affairs

Cisco Talos security researchers discovered multiple flaws in the LEADTOOLS imaging toolkits that could lead to code execution on the target system.

Covert monitoring in the workplace – impact on an employee’s privacy

Data Protection Report

The Grand Chamber of the European Court of Human Rights (ECHR) has held that Spanish shop workers’ right to privacy under Article 8(1) of the European Convention on Human Rights was not violated when their employer obtained evidence of theft from covert CCTV footage of the employees.

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

DNA-testing startup Veritas Genetics disclosed a security breach

Security Affairs

DNA-testing startup Veritas Genetics disclosed a security breach that exposed customer information, but genetic information, health records are not affected.

Bugcrowd Pays Out Over $500K in Bounties in One Week

Dark Reading

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone

58

Capesand is a new Exploit Kit that appeared in the threat landscape

Security Affairs

A recently discovered exploit kit dubbed Capesand is being involved in live attacks despite the fact that it’s still under development. In October 2019, researchers at TrendMicro discovered a new exploit kit dubbed Capesand that is being involved in live attacks.

Cloudflare CEO Matthew Prince on the Struggles of Policing the Web

WIRED Threat Level

At WIRED25 the internet infrastructure chief talks about doing the hard calculus of pulling support from controversial sites—and why that’ll happen again. Security Security / Privacy

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Security Affairs

Pwn2Own Tokyo 2019 -Day2: Experts earned a total of $120,000 for finding exploits against Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers.

IT 58

10 top strategic trends that will drive data management in 2020

Information Management Resources

Research firm Gartner, Inc. has identified the 10 top strategic technology trends that organizations need to explore in 2020. Artificial intelligence Data strategy Blockchain Data security Cloud computing

Federal and State Authorities Increase Scrutiny and Enforcement of Children’s Privacy; Google, YouTube Agree to Pay a Record $170 Million Fine

Data Matters

This fall, scrutiny has increased on children’s privacy with the FTC and New York Attorney General’s announcement of the largest fine ever for violations of the Children’s Online Privacy Protection Act (“COPPA”), followed by FTC public workshops on updating the COPPA Rule. Combined with increased requirements for the sale of teen personal information under the California Consumer Privacy Act (“CCPA”), and calls for triple fines for children’s privacy violations under a potential CCPA 2.0